Withstanding detector attacks in continuous-variable quantum key distribution via mean-restricted unary linear regression

被引:0
|
作者
Jiang, Wenqi [1 ]
Li, Jinyang [2 ]
Jin, Di [1 ]
Zhang, Hang [1 ]
Zuo, Zhiyue [1 ]
Guo, Ying [3 ]
机构
[1] Cent South Univ, Sch Automat, Changsha 410083, Peoples R China
[2] NorthWest A&F Univ, Xianyang 712100, Peoples R China
[3] Beijing Univ Posts & Telecommun, Sch Comp Sci, Beijing 100876, Peoples R China
基金
中国国家自然科学基金;
关键词
Continuous-variable quantum key distribution; Homodyne detector; Finite linearity domain; Mean-restricted unary linear regression;
D O I
10.1007/s11128-024-04266-4
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
The distinguishing of coherent states with minimum error is one of the fundamental tasks in continuous-variable quantum key distribution (CV-QKD). Homodyne detector, which is also a common element in current telecommunication, is considered as the simplest setup for such tasks due to it relying only on Gaussian operations. However, a practical homodyne detector has a finite linearity domain, thus eavesdroppers can open secure loopholes by displacing its operation into the nonlinearity domain, e.g., saturation attack and homodyne-detector-blinding attack. Here, we propose a counteracting strategy using mean-restricted unary linear regression to defend against such attacks caused by finite linearity domain problem. This strategy, which relies only on local operations plus classical communication (LOCC) processing, can estimate the displacements from the eavesdropper and then recover the attacked data. To show its practical utility in CV-QKD, we discuss two potential applications under composable security: (1) against saturation attack with one average to limit the line fitted, (2) against homodyne-detector-blinding attack with various averages to limit the line fitted. Numerical analysis shows that the estimated displacements have acceptable accuracy compared with the real displacements caused by the eavesdropper.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Practical implementation,of continuous-variable quantum key distribution
    Hirano, Takuya
    Shimoguchi, Atsushi
    Shirasaki, Kazuya
    Tokunaga, Shingo
    Furuki, Atsushi
    Kawamoto, Yohei
    namiki, Ryo
    QUANTUM INFORMATION AND COMPUTATION IV, 2006, 6244
  • [32] Digital synchronization for continuous-variable quantum key distribution
    Chin, Hou-Man
    Jain, Nitin
    Andersen, Ulrik L.
    Zibar, Darko
    Gehring, Tobias
    QUANTUM SCIENCE AND TECHNOLOGY, 2022, 7 (04)
  • [33] A Review on Continuous-Variable Quantum Key Distribution Security
    Garcia-Callejo, Aida
    Ruiz-Chamorro, Andres
    Cano, Daniel
    Fernandez, Veronica
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING & AMBIENT INTELLIGENCE (UCAMI 2022), 2023, 594 : 1073 - 1085
  • [34] Eigenchannel Decomposition for Continuous-Variable Quantum Key Distribution
    Gyongyosi, L.
    Imre, S.
    ADVANCES IN PHOTONICS OF QUANTUM COMPUTING, MEMORY, AND COMMUNICATION VIII, 2015, 9377
  • [35] Performance improvement of continuous-variable quantum key distribution via photon subtraction
    Huang, Peng
    He, Guangqiang
    Fang, Jian
    Zeng, Guihua
    PHYSICAL REVIEW A, 2013, 87 (01):
  • [36] Synchronization Schemes for Continuous-Variable Quantum Key Distribution
    Liu, Changjiang
    Zhao, Yijia
    Zhang, Yichen
    Zheng, Ziyong
    Yu, Song
    INTERNATIONAL CONFERENCE ON OPTOELECTRONICS AND MICROELECTRONICS TECHNOLOGY AND APPLICATION, 2017, 10244
  • [37] Polarization attack on continuous-variable quantum key distribution
    Zhao, Yijia
    Zhang, Yichen
    Huang, Yundi
    Xu, Bingjie
    Yu, Song
    Guo, Hong
    JOURNAL OF PHYSICS B-ATOMIC MOLECULAR AND OPTICAL PHYSICS, 2019, 52 (01)
  • [38] Notes on a Continuous-Variable Quantum Key Distribution Scheme
    Ichikawa, Tsubasa
    Hirano, Takuya
    Matsubara, Takuto
    Ono, Motoharu
    Namiki, Ryo
    JOURNAL OF THE PHYSICAL SOCIETY OF JAPAN, 2017, 86 (09)
  • [39] Continuous-variable quantum key distribution with entanglement in the middle
    Weedbrook, Christian
    PHYSICAL REVIEW A, 2013, 87 (02):
  • [40] Quantum hacking of continuous-variable quantum key distribution systems: realtime Trojan-horse attacks
    Stiller, B.
    Khan, I.
    Jain, N.
    Jouguet, P.
    Kunz-Jacques, S.
    Diamanti, E.
    Marquardt, Ch.
    Leuchs, G.
    2015 CONFERENCE ON LASERS AND ELECTRO-OPTICS (CLEO), 2015,